Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
criminal
How to protect the corporate network from spyware

It used to be easy for network administrators to identify where corporate boundaries are; they were usually where the external and internal networks meet. That made it easy …

healthcare
We cannot afford for healthcare security to be the “lowest-hanging fruit”

Healthcare organizations have never been more essential. Yet when it comes to cybersecurity, too many hospitals, medical groups and research centers lag far behind other …

Privacy Shield
How do I select a data privacy management solution for my business?

As companies collect more personal data, concerns around its privacy are growing too. People are becoming aware of the value their data holds and how it can be used for …

reload
How digital transformation impacted CIO and CTO roles

Transposit announced results from a recent research study about the evolving roles of the CIO and CTO, as well as the extent of and attitudes towards adoption of DevOps …

email
2 million malicious emails bypassed secure email gateways in 12 months

Two million malicious emails bypassed traditional email defenses, like secure email gateways, between July 2020-July 2021, according to data from Tessian. Who’s being targeted …

cloud money
Whole cloud spending to surpass $1.3 trillion by 2025

Over the past decade, cloud computing has become the foundation for the delivery of mobile and content services as well as an alternative to traditional enterprise computing …

US agricultural co-op hit by ransomware, expects food supply chain disruption

New Cooperative Inc., an agricultural cooperative owned by Iowa corn and soy farmers, has been hit by the BlackMatter ransomware group. The attackers are asking the co-op to …

microsoft power apps
Microsoft Power Apps data exposure: Prioritizing sensitive data with secure configuration settings

Security misconfigurations are one of the most common gaps hackers look to exploit. One bad configuration setting in a popular cloud platform can have far-reaching …

patch
The complexities of vulnerability remediation and proactive patching

In this interview with Help Net Security, Eran Livne, Director, Product Management, Endpoint Remediation at Qualys, discusses vulnerability remediation complexity, the …

idea
Industry trends and insights of CISOs around the world

Marlin Hawk released a research report which explores industry trends and insights of CISOs around the world, the challenges they face in the cybersecurity landscape, as well …

fix
77% of execs concerned about security tools gaps in their company

77% of Americans believe their company has gaps in its current security tools, according to Lynx Software survey findings. 500 Americans in managerial and executive roles were …

chess
Organizations prioritize strategic security programs, but lack fundamentals

Organizations are prioritizing strategic security programs but missing the foundational capabilities they need to make meaningful changes to their security posture, a …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools